More

    Scalefusion now Supports OEMConfig for Zebra and Honeywell Rugged Devices

    Share On

    OEM Config
    OEMConfig for Rugged Devices

    As a trusted MDM solution provider, Scalefusion is happy to announce that it now supports OEMConfig settings for Zebra and Honeywell rugged devices, which adds Original Equipment Manufacturer (OEM) specific device management and security features.

    Organizations that deploy and use Android-based rugged devices from Zebra or Honeywell can now leverage the OEMConfig app provided by respective vendors to gain granular device control and enhanced security features via Scalefusion MDM.

    What is OEMConfig and How it Works?

    OEMConfig is an application built by the OEM containing its APIs and hosted on Google Play. Organizations distribute the OEMConfig app to the devices through an EMM. The OEMConfig app supports AppConfig, which allows organizations to configure the OEM settings while distributing the app itself. After the OEMConfig app is installed, it configures a device to support the specific features and settings of that OEM. Through OEMConfig, MDM vendors like Scalefusion can support the advanced management capabilities developed by the OEMs into their devices.

    OEMConfig aims to eliminate the complexity for MDM providers to build individual support for each and every OEM specific device features and settings. This has made it super-efficient for Android EMM providers like Scalefusion to support all the OEM-specific management features and security settings remotely on the Android devices.

    Learn more in detail about what is OEMConfig and why was it introduced

    Drive security and additional functionality of Zebra and Honeywell Rugged Devices with OEMConfig App through Scalefusion

    Organizations that have deployed Zebra and Honeywell rugged devices for their mission-critical business processes or those who are looking to use and deploy these devices and manage them via a Mobile Device Management Solution can leverage the following features:

    For Zebra Rugged Devices

    Zebra Technologies is a prominent manufacturer of ruggedized devices that are used by multiple industrial sectors like healthcare, retail, logistics, manufacturing and so on. Zebra OEMConfig will offer the following features:

    • Device Administration Configuration: Reserve and Unreserve UI
    • Display Configuration: Control display size and font size
    • Wireless WAN Configuration: Supports WWAN advanced features
    • Wakeup Configuration: Control wake-up source method
    • Service Access Configuration: Control access by apps to specific CSPs
    • Worry-Free WiFi Configuration: Supports Worry-Free Wi-Fi password features
    • DataWedge Configuration: Supports restrictions

    For detailed information on Zebra OEM configuration settings, visit the official site here.

    Honeywell Rugged Devices

    Scalefusion also supports OEMConfig for Honeywell rugged devices to make the management extensions and OEM-level capabilities available for the IT admins, which they can apply to the managed Android devices as per relevant business use cases, security and management requirements.

    Some of the supported features are:

    • Applications: Whitelist/Blacklist Apps
    • Operational Intelligence Settings: AgentConnectDirect Settings
    • Display Settings: Adaptive brightness, Display Sleep, Brightness Level
    • Input and Output Settings: LED Settings, Battery LED Mode
    • Key Remap and Wakeup Settings
    • Touch Settings
    • Network Settings
    • WiFi Settings
    • WWAN Settings
    • System Settings

    The enterprise capabilities, management features, and security settings provided by OEMConfig apps are being utilized by IT leaders to make their Android devices perform better in a secure, flexible yet innovative environment.

    Explore how Scalefusion Rugged Device Management can make your rugged devices do more for you! Start your 14-day free trial now.

    Sonali Datta
    Sonali Datta
    Sonali has an extensive experience in content writing, marketing, and strategy and she has worked with companies where she was involved in the 360-degree content production and editing. An avid reader and animal lover, she loves to cook, take care of her plants and travel.

    Latest Articles

    Step-wise IT compliance management strategy for 2025

    Why does IT compliance management need a reboot in 2025? Because it has officially entered its burnout period. With frameworks multiplying, regulations rising, and...

    USB device management on MacBooks: Keeping student data secure

    Student MacBooks are expected to support learning, not sidetrack it. But in classrooms where students use school-issued Macs, it's surprisingly easy for things to...

    Key limitations of URL filtering in web filtering software

    Imagine a teen community center offering free Wi-Fi for students. One day, a teenager clicks on a harmful link, exposing their device to malware....

    Latest From Author

    How to Whitelist a Website? A Step-by-Step Guide

    Website whitelisting is a cybersecurity tactic in which an administrator explicitly regulates a policy or framework on managed devices in advance, which will be...

    How To Launch a SaaS Product Successfully

    Launching any SaaS product is an exciting journey that ties innovation with strategy, and creativity with execution. Say you've spent months, even years, building...

    7 Must-Have Qualities of an Entrepreneur to Influence People

    "Success in business requires training, discipline and hard work. But if you're not frightened by these things, the opportunities are just as great today...

    More from the blog

    Simplify Shared iPad Management in Classrooms with Scalefusion

    In a class full of eager 30 students, how are you planning to go around with only 10 iPads...

    Mac security for enterprises: A comprehensive guide

    Macs are undeniably cool. Their sleek and stylish design makes users feel like tech experts. Plus, they come with...

    ​How to configure user account restrictions in Windows with...

    Implementing robust restrictions on user accounts in Windows is a critical step toward protecting systems against unauthorized access and...